References
- H. Li, J. Wu, Y. Gao, and Y. Shi, "Examining individuals' adoption of healthcare wearable devices: an empirical study from privacy calculus perspective," Int. J. Med. Inform., vol. 88, no. 555, pp. 8-17, 2016. https://doi.org/10.1016/j.ijmedinf.2015.12.010
- Y. Jang, "'Wearable era' health information leakage risk," The Kyunghyang Shinmun, 28-Feb-2017.
- T. Wang, T. D. Duong, and C. C. Chen, "Intention to disclose personal information via mobile applications: A privacy calculus perspective," Int. J. Inf. Manage., vol. 36, no. 4, pp. 531-542, 2016. https://doi.org/10.1016/j.ijinfomgt.2016.03.003
- K. Barnes, V. Kauffman, and C. Connolly, "Health wearables : early days," 2014.
- D. Yadron, "America's top privacy regulator refuses to wear a Fitbit," The Guardian, 2016.
- Z. Whittaker, "How Strava's 'anonymized' fitness tracking data spilled government secrets," ZD net, 2018.
- Y. Gao, H. Li, and Y. Luo, "An empirical study of wearable technology acceptance in healthcare," Ind. Manag. Data Syst., vol. 115, no. 9, pp. 1704-1723, 2015. https://doi.org/10.1108/IMDS-03-2015-0087
- M. Shin and Y. Lee, "A sutdy on the influential factors of purchase intention of wrist wearable device," J. Korea Contents Assoc., vol. 15, no. 15, pp. 498-506, 2015. https://doi.org/10.5392/JKCA.2015.15.05.498
- S. Lee, W. Yoo, H. Park, and S. Kim, "An empirical study on acceptance intention towards healthcare wearable device," J. Inf. Syst., vol. 25, no. 2, pp. 27-50, Jun. 2016. https://doi.org/10.5859/KAIS.2016.25.2.27
- H.-J. Son, S.-W. Lee, and M.-H. Cho, "Influential factors of college students' intention to use wearable device: an application of the UTAUT2 model," J. Commun. Inf., vol. 68, pp. 7-33, 2014.
- M. Baek, H. Choi, and H. Lee, "Age-specific acceptance intention over wearable smart healthcare device," Korean Jouranl Bus. Adm., vol. 28, no. 12, pp. 3171-3189, 2015.
- N. Farag Awad and M. S. Krishnan, "The Personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization," MIS Q., vol. 30, no. 1, pp. 13-28, 2006. https://doi.org/10.2307/25148715
- H. J. Smith, S. J. Milberg, and S. J. Burke, "Information privacy: measuring individuals' concerns about organizational practices about organizational practices1," MIS Q., vol. 20, no. 2, pp. 167-196, 1996. https://doi.org/10.2307/249477
- K. A. Stewart and A. H. Segars, "An empirical examination of the concern for information privacy instrument," Inf. Syst. Res., vol. 13, no. 1, pp. 36-49, 2002. https://doi.org/10.1287/isre.13.1.36.97
- N. K. Malhotra, S. S. Kim, J. Agarwal, G. Tech, and W. Peachtree, "Internet users' information privacy concerns (IUIPC): the construct, the scale, and a causal model," Inf. Syst. Res., vol. 15, no. 4, pp. 336-355, 2004. https://doi.org/10.1287/isre.1040.0032
- M. J. Keith, S. C. Thompson, J. Hale, P. B. Lowry, and C. Greer, "Information disclosure on mobile devices: re-examining privacy calculus with actual user behavior," Int. J. Hum. Comput. Stud., vol. 71, no. 12, pp. 1163-1173, 2013. https://doi.org/10.1016/j.ijhcs.2013.08.016
- H. Chen and W. Li, "Mobile device users' privacy security assurance behavior: a technology threat avoidance perspective," Inf. Comput. Secur., vol. 25, no. 3, pp. 330-344, 2017. https://doi.org/10.1108/ICS-04-2016-0027
- H. Xu, S. Gupta, B. Rosson, Mary, and M. Carroll, John, "Measuring mobile users' concerns for information privacy," in Proc. of Proceedings of the 33rd International Conference on Information Systems, 2012, no. June, pp. 1-16.
- H. J. Smith, T. Dinev, and H. Xu, "Inforamtion privacy research : an interdisciplinary review," MIS Q., vol. 35, no. 4, pp. 989-1015, 2011. https://doi.org/10.2307/41409970
- R. S. Laufer and M. Wolfe, "Privacy as a concept and a social issue: a multidimensional developmental theory," J. Soc. Issues, vol. 33, no. 3, pp. 22-42, 1977. https://doi.org/10.1111/j.1540-4560.1977.tb01880.x
- M. J. Culnan and P. K. Armstrong, "Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation," Organ. Sci., vol. 10, no. 1, pp. 104-115, 1999. https://doi.org/10.1287/orsc.10.1.104
- T. Dinev and P. Hart, "An extended privacy calculus model for e-commerce transactions," Inf. Syst. Res., vol. 17, no. 1, pp. 61-80, 2006. https://doi.org/10.1287/isre.1060.0080
- K.A. Park, "The effect of perceived value and information disclosure on continuous usage in location based services users," Graduate School of Chosun University, 2013.
- H. Xu, X. Luo, J. M. Carroll, and M. B. Rosson, "The personalization privacy paradox: an exploratory study of decision making process for location-aware marketing," Decis. Support Syst., vol. 51, no. 1, pp. 42-52, 2011. https://doi.org/10.1016/j.dss.2010.11.017
- J. Kim and S. Kim, "The effect of relationships between justice and privacy calculus on intention to disclose personal information," J. Internet Electron. Commer. Res., vol. 14, no. 1, pp. 45-67, 2014.
- Y. Li, "Theories in online information privacy research: a critical review and an integrated framework," Decis. Support Syst., vol. 54, no. 1, pp. 471-481, 2012. https://doi.org/10.1016/j.dss.2012.06.010
- I. Ajzen and M. Fishbein, Understanding attitudes and predicting social behaviour. Englewood Cliffs, New Jersey: Prentice-Hall, 1980.
- I. Ajzen, "The theory of planned behavior," Organ. Behav. Hum. Decis. Process., vol. 50, no. 2, pp. 179-211, Dec. 1991. https://doi.org/10.1016/0749-5978(91)90020-T
- S. Kokolakis, "Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon," Comput. Secur., vol. 64, pp. 122-134, 2017. https://doi.org/10.1016/j.cose.2015.07.002
- S. Chae, Y. Lee, Y. Jung, and S. M. Choi, "An investigation of users' intention to use wearable devices in the privacy-calculus framework," Inf. Soc. Media, vol. 17, no. 2, pp. 99-128, 2016.
- H. Kim, H. C. Chan, and S. Gupta, "Value-based adoption of mobile internet : an empirical investigation," Decis. Support Syst., vol. 43, pp. 111-126, 2007. https://doi.org/10.1016/j.dss.2005.05.009
- S. Chen and C. Lin, "The impact of customer experience and perceived value on sustainable social relationship in blogs : an empirical study," Technol. Forecast. Soc. Chang., vol. 96, pp. 40-50, 2015. https://doi.org/10.1016/j.techfore.2014.11.011
- C. Morosan and A. DeFranco, "Disclosing personal information via hotel apps: a privacy calculus perspective," Int. J. Hosp. Manag., vol. 47, pp. 120-130, 2015. https://doi.org/10.1016/j.ijhm.2015.03.008
- A. Weinhard and M. Hauser, "Explaining adoption of pervasive retail systems with a model based on UTAUT2 and the extended privacy calculus," in Proc. of Twenty First Pacific Asia Conference on Information System(PACIS) 2017 Proceedings, 2017, no. 217.
- H. Yang, J. Yu, H. Zo, and M. Choi, "User acceptance of wearable devices: an extended perspective of perceived value," Telemat. Informatics, vol. 33, no. 2, pp. 256-269, 2016. https://doi.org/10.1016/j.tele.2015.08.007
- F. D. Davis, R. P. Bagozzi, and P. R. Warshaw, "User acceptance of computer technology: a comparison of two theoretical models," Manage. Sci., vol. 35, no. 8, pp. 982-1003, Aug. 1989. https://doi.org/10.1287/mnsc.35.8.982
- F. D. Davis, "Perceived usefulness, perceived ease of use, and user acceptance of information technology," MIS Q., vol. 13, no. 3, p. 319-340., 1989. https://doi.org/10.2307/249008
- J. Bae, Y. Jung, and W. Cho, "Users' Privacy Concerns in the Internet of Things (IoT): The Case of Activity Trackers," Knowl. Manag. Soc. Korea, vol. 16, no. 3, pp. 23-40, 2015. http://dx.doi.org/10.15813/kmr.2015.16.3.002
- D. J. Solove, "A Taxonomy of Privacy," Univ. PA. Law Rev., vol. 154, no. 3, pp. 477-564, 2006. https://doi.org/10.2307/40041279
- M. J. Culnan and R. J. Bies, "Consumer privacy: balancing economic and justice considerations," J. Soc. Issues, vol. 59, no. 2, pp. 323-342, Jun. 2003. https://doi.org/10.1111/1540-4560.00067
- F. V. Cespedes and H. J. Smith, "Database Marketing : New Rules for Policy and Practice," Sloan Manag. Rev., vol. 34, no. 4, pp. 7-10, 1993.
- M. J. Dutta-Bergman, "Primary sources of health information: comparisons in the domain of health attitudes, health cognitions, and health behaviors," Health Commun., vol. 16, no. 3, pp. 273-288, Jul. 2004. https://doi.org/10.1207/S15327027HC1603_1
- H. K. Kim and Y. S. Kim, "The effects of smartphone application to increase physical activity among university students," Korean J. Phys. Educ., vol. 51, no. 5, pp. 457-466, 2012.
- H. J. Kong, J. Kim, E. J. Hwang, J. Hong, and S. W. Kim, "Effects of healthcare smart home exercise program on the metabolic syndrome risk factors of obese elderly women," J. Korean Gerontol. Soc., vol. 34, no. 1, pp. 103-114, 2014.
- V. G. Motti and K. Caine, "Users' privacy concerns about wearables," Financial Cryptography and Data Security, 2015, pp. 231-244.
- P. M. Bentler, "Comparative fit indexes in structural models.," Psychol. Bull., vol. 107, no. 2, pp. 238-246, 1990. https://doi.org/10.1037/0033-2909.107.2.238
- J. F. Hair, W. C. Black, B. J. Babin, R. E. Anderson, and R. L. Tatham, Multivariate data analysis. Uppersaddle River. Prentice-Hall International, 1998.
- H. Xu, T. Dinev, J. Smith, and P. Hart, "Information privacy concerns : linking individual perceptions with institutional privacy assurances," J. Assoc. Inf. Syst., vol. 12, no. 12, pp. 798-824, 2011.
- P. M. Podsakoff, S. B. MacKenzie, J. Y. Lee, and N. P. Podsakoff, "Common method biases in behavioral research: a critical review of the literature and recommended remedies," J. Appl. Psychol., vol. 88, no. 5, pp. 879-903, 2003. https://doi.org/10.1037/0021-9010.88.5.879
- J. W. Kim, M. G. Kim, and S. H. Hong, Writing paper with structural equation model. Seoul: Communication Books, 2009.
- J. C. Anderson and D. W. Gerbing, "Structural equation modeling in practice: a review and recommended two-step approach.," Psychol. Bull., vol. 103, no. 3, pp. 411-423, 1988. https://doi.org/10.1037/0033-2909.103.3.411
- Y. joon Cheon, S. K. Choi, J. Kim, and K. T. Kwak, "Antecedents of relational inertia and information sharing in SNS usage: the moderating role of structural autonomy," Technol. Forecast. Soc. Change, vol. 95, pp. 32-47, 2015. https://doi.org/10.1016/j.techfore.2014.05.002
- W. Chin, "The partial least squares approach to structural equation modeling," Mod. methods Bus. Res., vol. 295, no. 2, pp. 295-336, 1998.
- H. Xu and H.-H. Teo, "Alleviating consumers' privacy concerns in location-based services: a psychological control perspective," in Proc. of Twenty-Fifth Int. Conf. Inf. Syst. ICIS 2004, no. Beinat 2001, pp. 793-806, 2004.
Cited by
- How to Improve Users’ Loyalty to Smart Health Devices? The Perspective of Compatibility vol.13, pp.19, 2018, https://doi.org/10.3390/su131910722
- Determinants and Cross-National Moderators of Wearable Health Tracker Adoption: A Meta-Analysis vol.13, pp.23, 2018, https://doi.org/10.3390/su132313328